New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data

New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. “This campaign leverages deceptive CAPTCHA verification pages that trick users into executing a malicious PowerShell script, which ultimately deploys the infostealer, harvesting sensitive data such as credentials, browser information,…

Almost Half of Google Searches Are Branded. Here’s Why That Matters
|

Almost Half of Google Searches Are Branded. Here’s Why That Matters

When most marketers think about SEO, they jump straight to keywords like “best running shoes” or “how to do [whatever]”. Non-branded, high-intent, top-of-funnel stuff. But our latest study might surprise you: Nearly half of all Google searches (45.7%) are branded searches—meaning people are actively seeking out specific companies and products they already know. Yep, nearly…

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat actor. “ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nation-state actor, which affected a very…

Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files. TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow e-commerce site customers to save their favorite products for later and share the lists…

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the App Store is confronted by a wide range of threats that seek to defraud users in various ways, ranging from “deceptive apps designed to steal…

Generative Engines Are Breaking Web Analytics and Hurting Their Future
|

Generative Engines Are Breaking Web Analytics and Hurting Their Future

Search is moving from traditional search engines to generative engines, but traffic from many of these sites isn’t being tracked properly in analytics. It’s their fault, not yours. I was looking at our LLM filter in Ahrefs Web Analytics and noticed some common generative engines missing from the list. They’re in our filters, but we aren’t…

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with an install‑time script that’s triggered during npm install, Socket security researcher Kirill Boychenko said in…

AI Content Marketing 101: Strategies from Someone Who Lives It
|

AI Content Marketing 101: Strategies from Someone Who Lives It

According to our upcoming study, 87% of marketers use AI for content. I’m one of them. AI helped me build a career around writing. It’s part of nearly everything I do. Honestly, I can’t even remember how I worked without it—and I don’t want to. It gives me a “second brain” and superhuman speed, and takes care…

An Analysis of AI Overview Brand Visibility Factors (75K Brands Studied)
|

An Analysis of AI Overview Brand Visibility Factors (75K Brands Studied)

With Google’s AI mode developments, we’re heading toward a future where search results could eventually roll up into one big AI Overview. Soon it won’t be a case of “Should I, or shouldn’t I optimize for AI Overviews?” If you want any chance of search visibility, you’ll need to understand how to rank in Google’s…

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. “Catena uses embedded shellcode and configuration switching logic to…

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. “The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk,” Expel said in a report shared with The Hacker News. “This removes…

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat actor has been observed exploiting a critical security flaw impacting Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers (CVE-2023-20118) to corral them…